Background Image
Previous Page  94 / 552 Next Page
Information
Show Menu
Previous Page 94 / 552 Next Page
Page Background

INFORMS Philadelphia – 2015

92

3 - An Empirical Analysis of Sustainable Supply Chain Capabilities

and Cross-Value Integration

Peiran Gao, Huazhong University of Science and Technology,

School of Management, 1037 Luoyu Road, Wuhan, China,

gaopeiran2007@126.com

, Yeming Gong, Jinlong Zhang

Using multi-source data from more than 100 organizations in retailing industry,

we apply structural equation modeling to understand nonlinear relationship

among cross-value integration, supply chain coordination and integration, and

the performance of sustainable supply chain. We find the moderate effect of cross-

value integration on the relationship between sustainable supply chain

capabilities and operational competencies.

4 - Storage Location and Pick Position Assignment Problem for

MIAPP-AS/RS

Faraz Ramtin, University of Central Florida, 2011 Puritan Rd,

Orlando, FL, 32807, United States of America,

faraz.ramtin@ucf.edu,

Jennifer Pazour

MIAPP-AS/RS is a semi-automated case-level order fulfillment technology. The

put-away to the storage locations and replenishment to pick positions are

performed by the crane and the in-the-aisle case-picking is done by human order

pickers. We develop binary integer models to find the optimal assignment of SKUs

to storage locations, as well as to pick positions for a dedicated storage policy. We

develop an accelerated Benders Decomposition approach to improve the

tractability of the models.

SB79

79-Room 302, CC

Software Demonstration

Cluster: Software Demonstrations

Invited Session

1 - Simio Simulation and Scheduling Software - Introduction to Simio

Simulation and Scheduling Software

C Dennis Pegden, CEO and Founder, Simio Simulation and

Scheduling Software, Eric Howard

Simio is a premier simulation and scheduling software that allows you to expand

traditional benefits of simulation to improve daily operations. In this tutorial, we

will demonstrate Simio’s 3D rapid modeling capability to effectively solve real

problems. Explore how a single tool can be used to not only optimize your system

design, but also provide effective planning and scheduling. Come explore the

Simio difference and see why so many professional and novice simulationists are

changing to Simio.

2 - Forio Simulations - Publishing Interactive Analytics or Operations

Research Models on the Web

Michael Bean, Co-Founder and President, Forio Simulations

Forio’s web platform makes your analytic model available to hundreds of people

within your organization through the browser. We will start with an introduction

to the platform and example analytics applications. Then we’ll divide the

workshop into two parts. In the first part we will teach you how to get your

analysis on a server so it can be shared. In the second part we’ll focus on creating

a user interface for your model.

Sunday, 1:30pm - 3:00pm

SC01

01-Room 301, Marriott

Military O.R. and Applications I

Sponsor: Military Applications

Sponsored Session

Chair: Michael Hirsch, ISEA TEK, 620 N. Wymore Rd., Ste. 260,

Maitland, FL, 32751, United States of America,

mhirsch@iseatek.com

1 - An Algorithm for Solving the Convoy Routing Problem

Ambika Tiwari, Research Scholar, IIT Madras, DoMS,Delhi

Avenue, 834, Sabarmati Hostel, Chennai, 600036, India,

tiwariambika4@gmail.com

, Chandrasekharan Rajendran,

Hans Zeigler

The problem of routing military convoys from a specific origin to a destination

adhering to certain constraints is considered. An algorithm for minimizing the

sum of arrival times at destination of the convoys is proposed. Its performance

with respect to that of existing algorithm is analyzed. Computational results are

presented.

2 - The Spectrum of Anarchy: Algorithmic Game Theory in

UAV Routing

Michael Couche, University at Buffalo, 342 Bell Hall, Buffalo,

United States of America,

mjcouche@gmail.com,

Nagi Rakesh,

Mark Karwan

Game theoretic routing approaches lend insight into the price of anarchy that

occurs due to decentralization. We can model a team of UAVs using several

different approaches, ranging from greedy-based routing, competitive gaming,

leader-follower gaming, to cooperative gaming. A comparison of the algorithms

used is presented, along with a discussion of using these approaches as a fast

routing heuristic that competes with mathematical programming models.

3 - Optimization of UAV Teams

Hector Ortiz-pena, CUBRC, Genesee St, Buffalo, United States of

America,

hector.ortiz-pena@cubrc.org

, Michael Hirsch,

Moises Sudit, Mark Karwan

We develop a formulation to maximize the information gain from a team of

autonomous unmanned vehicles (UxVs) to support Intelligence, Surveillance and

Reconnaissance (ISR) mission objectives. The formulation is used to evaluate the

Price of Anarchy.

SC02

02-Room 302, Marriott

Cyber-Physical Protection Models and Analysis

Cluster: Homeland Security

Invited Session

Chair: Feng Pan, Research Engineer, Pacific Northwest National

Laboratory, P.O. Box 999 MSIN K1-85, Richland, WA, 99352,

United States of America,

feng.pan@pnnl.gov

Co-Chair: Guanhua Yan, Assistant Professor, Binghamton University,

Department of Computer Science, Binghamton, NY, 13902,

United States of America,

ghyan@binghamton.edu

1 - Analytical Framework for Cyber-physical Integrated Assessment:

An Overview

Matthew Oster, Pacific Northwest National Laboratory, 902

Battelle Blvd, Richland, WA, 99352, United States of America,

matthew.oster@pnnl.gov

, Casey Perkins

Cyber and physical security systems present a unique challenge for security

analyses traditionally charged with focusing on only a singular aspect of the

system, either physical or cyber. Looking at an integrated security environment

requires revisiting vulnerability analysis methods and integrating previously

isolated evaluations. This talk will focus on the challenge of creating an integrated

modeling framework with both physical and cyber security elements to quantify

hidden vulnerability.

2 - A Big Data Approach to Automating Malware Analysis

Guanhua Yan, Assistant Professor, Binghamton University,

Department of Computer Science, Binghamton, NY, 13902,

United States of America,

ghyan@binghamton.edu,

Yunus Kucuk

Thwarting the severe threat posed by the voluminous malware variants demands

effective, yet efficient, techniques for malware analysis. We propose a big data

framework for automated malware analysis. This framework combines various

big data tools to provide a unifying and scalable solution to a wide range of

malware analysis tasks, such as classification, clustering, and indexing. We will

present our experience with developing this framework, as well as the research

challenges ahead.

3 - A Mixed Integer Program for Securing a Cyber-physical System

Feng Pan, Research Engineer, Pacific Northwest National

Laboratory, P.O. Box 999 MSIN K1-85, Richland, WA, 99352,

United States of America,

feng.pan@pnnl.gov,

Casey Perkins,

Samrat Chatterjee, Satish Chikkagoudar, Matthew Oster

Securing a modern facility has to consider both cyber and physical aspects. In this

talk, we present a set of metrics for measuring facility security. Given the

complexity of facilities, simulation models are often used to measure the overall

security. Combining simulation results, we introduce a mixed integer

programming approach to allocate security assets in both cyber and physical

layers for enhancing security of a facility.

SB79